Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Optimizing Implementations of Boolean Functions.. IACR Cryptol. ePrint Arch., (2024)The Multiplicative Complexity of Boolean Functions on Four and Five Variables., and . IACR Cryptol. ePrint Arch., (2015)The Number of Boolean Functions with Multiplicative Complexity 2., , and . IACR Cryptology ePrint Archive, (2015)TMPS: Ticket-Mediated Password Strengthening., , , and . IACR Cryptology ePrint Archive, (2019)Message Recovery and Pseudo-preimage Attacks on the Compression Function of Hamsi-256., and . LATINCRYPT, volume 6212 of Lecture Notes in Computer Science, page 205-221. Springer, (2010)Near-Collisions for the Reduced Round Versions of Some Second Round SHA-3 Compression Functions Using Hill Climbing., and . INDOCRYPT, volume 6498 of Lecture Notes in Computer Science, page 131-143. Springer, (2010)On Feedback Functions of Maximum Length Nonlinear Feedback Shift Registers., , and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 93-A (6): 1226-1231 (2010)Boolean functions with multiplicative complexity 3 and 4., , and . Cryptogr. Commun., 12 (5): 935-946 (2020)The Multiplicative Complexity of Boolean Functions on Four and Five Variables., and . LightSec, volume 8898 of Lecture Notes in Computer Science, page 21-33. Springer, (2014)On Independence and Sensitivity of Statistical Randomness Tests., , and . SETA, volume 5203 of Lecture Notes in Computer Science, page 18-29. Springer, (2008)